{"dataType":"CVE_RECORD","cveMetadata":{"cveId":"CVE-2024-6387","assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","state":"PUBLISHED","assignerShortName":"redhat","dateReserved":"2024-06-27T13:41:03.421Z","datePublished":"2024-07-01T12:37:25.431Z","dateUpdated":"2025-12-11T06:17:03.387Z"},"containers":{"cna":{"title":"Openssh: regresshion - race condition in ssh allows rce/dos","metrics":[{"other":{"content":{"value":"Important","namespace":"https://access.redhat.com/security/updates/classification/"},"type":"Red Hat severity rating"}},{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":8.1,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"format":"CVSS"}],"descriptions":[{"lang":"en","value":"A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period."}],"affected":[{"repo":"https://anongit.mindrot.org/openssh.git","versions":[{"status":"affected","version":"8.5p1","versionType":"custom","lessThanOrEqual":"9.7p1"}],"packageName":"OpenSSH","collectionURL":"https://www.openssh.com/","defaultStatus":"unaffected"},{"vendor":"Red Hat","product":"Red Hat Enterprise Linux 9","collectionURL":"https://access.redhat.com/downloads/content/package-browser/","packageName":"openssh","defaultStatus":"affected","versions":[{"version":"0:8.7p1-38.el9_4.1","lessThan":"*","versionType":"rpm","status":"unaffected"}],"cpes":["cpe:/a:redhat:enterprise_linux:9::appstream","cpe:/o:redhat:enterprise_linux:9::baseos"]},{"vendor":"Red Hat","product":"Red Hat Enterprise Linux 9","collectionURL":"https://access.redhat.com/downloads/content/package-browser/","packageName":"openssh","defaultStatus":"affected","versions":[{"version":"0:8.7p1-38.el9_4.1","lessThan":"*","versionType":"rpm","status":"unaffected"}],"cpes":["cpe:/a:redhat:enterprise_linux:9::appstream","cpe:/o:redhat:enterprise_linux:9::baseos"]},{"vendor":"Red Hat","product":"Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions","collectionURL":"https://access.redhat.com/downloads/content/package-browser/","packageName":"openssh","defaultStatus":"affected","versions":[{"version":"0:8.7p1-12.el9_0.1","lessThan":"*","versionType":"rpm","status":"unaffected"}],"cpes":["cpe:/a:redhat:rhel_e4s:9.0::appstream","cpe:/o:redhat:rhel_e4s:9.0::baseos"]},{"vendor":"Red Hat","product":"Red Hat Enterprise Linux 9.2 Extended Update Support","collectionURL":"https://access.redhat.com/downloads/content/package-browser/","packageName":"openssh","defaultStatus":"affected","versions":[{"version":"0:8.7p1-30.el9_2.4","lessThan":"*","versionType":"rpm","status":"unaffected"}],"cpes":["cpe:/o:redhat:rhel_eus:9.2::baseos","cpe:/a:redhat:rhel_eus:9.2::appstream"]},{"vendor":"Red Hat","product":"Red Hat OpenShift Container Platform 4.13","collectionURL":"https://catalog.redhat.com/software/containers/","packageName":"rhcos","defaultStatus":"affected","versions":[{"version":"413.92.202407091321-0","lessThan":"*","versionType":"rpm","status":"unaffected"}],"cpes":["cpe:/a:redhat:openshift:4.13::el9","cpe:/a:redhat:openshift:4.13::el8"]},{"vendor":"Red Hat","product":"Red Hat OpenShift Container Platform 4.14","collectionURL":"https://catalog.redhat.com/software/containers/","packageName":"rhcos","defaultStatus":"affected","versions":[{"version":"414.92.202407091253-0","lessThan":"*","versionType":"rpm","status":"unaffected"}],"cpes":["cpe:/a:redhat:openshift:4.14::el8","cpe:/a:redhat:openshift:4.14::el9"]},{"vendor":"Red Hat","product":"Red Hat OpenShift Container Platform 4.15","collectionURL":"https://catalog.redhat.com/software/containers/","packageName":"rhcos","defaultStatus":"affected","versions":[{"version":"415.92.202407091355-0","lessThan":"*","versionType":"rpm","status":"unaffected"}],"cpes":["cpe:/a:redhat:openshift:4.15::el8","cpe:/a:redhat:openshift:4.15::el9"]},{"vendor":"Red Hat","product":"Red Hat OpenShift Container Platform 4.16","collectionURL":"https://catalog.redhat.com/software/containers/","packageName":"rhcos","defaultStatus":"affected","versions":[{"version":"416.94.202407081958-0","lessThan":"*","versionType":"rpm","status":"unaffected"}],"cpes":["cpe:/a:redhat:openshift:4.16::el9"]},{"vendor":"Red Hat","product":"Red Hat Ceph Storage 5","collectionURL":"https://access.redhat.com/downloads/content/package-browser/","packageName":"openssh","defaultStatus":"unaffected","cpes":["cpe:/a:redhat:ceph_storage:5"]},{"vendor":"Red Hat","product":"Red Hat Ceph Storage 6","collectionURL":"https://access.redhat.com/downloads/content/package-browser/","packageName":"openssh","defaultStatus":"unaffected","cpes":["cpe:/a:redhat:ceph_storage:6"]},{"vendor":"Red Hat","product":"Red Hat Ceph Storage 7","collectionURL":"https://access.redhat.com/downloads/content/package-browser/","packageName":"openssh","defaultStatus":"unaffected","cpes":["cpe:/a:redhat:ceph_storage:7"]},{"vendor":"Red Hat","product":"Red Hat Enterprise Linux 10","collectionURL":"https://access.redhat.com/downloads/content/package-browser/","packageName":"openssh","defaultStatus":"unaffected","cpes":["cpe:/o:redhat:enterprise_linux:10"]},{"vendor":"Red Hat","product":"Red Hat Enterprise Linux 6","collectionURL":"https://access.redhat.com/downloads/content/package-browser/","packageName":"openssh","defaultStatus":"unaffected","cpes":["cpe:/o:redhat:enterprise_linux:6"]},{"vendor":"Red Hat","product":"Red Hat Enterprise Linux 7","collectionURL":"https://access.redhat.com/downloads/content/package-browser/","packageName":"openssh","defaultStatus":"unaffected","cpes":["cpe:/o:redhat:enterprise_linux:7"]},{"vendor":"Red Hat","product":"Red Hat Enterprise Linux 8","collectionURL":"https://access.redhat.com/downloads/content/package-browser/","packageName":"openssh","defaultStatus":"unaffected","cpes":["cpe:/o:redhat:enterprise_linux:8"]}],"references":[{"url":"https://access.redhat.com/errata/RHSA-2024:4312","name":"RHSA-2024:4312","tags":["vendor-advisory","x_refsource_REDHAT"]},{"url":"https://access.redhat.com/errata/RHSA-2024:4340","name":"RHSA-2024:4340","tags":["vendor-advisory","x_refsource_REDHAT"]},{"url":"https://access.redhat.com/errata/RHSA-2024:4389","name":"RHSA-2024:4389","tags":["vendor-advisory","x_refsource_REDHAT"]},{"url":"https://access.redhat.com/errata/RHSA-2024:4469","name":"RHSA-2024:4469","tags":["vendor-advisory","x_refsource_REDHAT"]},{"url":"https://access.redhat.com/errata/RHSA-2024:4474","name":"RHSA-2024:4474","tags":["vendor-advisory","x_refsource_REDHAT"]},{"url":"https://access.redhat.com/errata/RHSA-2024:4479","name":"RHSA-2024:4479","tags":["vendor-advisory","x_refsource_REDHAT"]},{"url":"https://access.redhat.com/errata/RHSA-2024:4484","name":"RHSA-2024:4484","tags":["vendor-advisory","x_refsource_REDHAT"]},{"url":"https://access.redhat.com/security/cve/CVE-2024-6387","tags":["vdb-entry","x_refsource_REDHAT"]},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2294604","name":"RHBZ#2294604","tags":["issue-tracking","x_refsource_REDHAT"]},{"url":"https://santandersecurityresearch.github.io/blog/sshing_the_masses.html"},{"url":"https://www.openssh.com/txt/release-9.8"},{"url":"https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt"}],"datePublic":"2024-07-01T08:00:00.000Z","problemTypes":[{"descriptions":[{"cweId":"CWE-364","description":"Signal Handler Race Condition","lang":"en","type":"CWE"}]}],"x_redhatCweChain":"CWE-364: Signal Handler Race Condition","workarounds":[{"lang":"en","value":"The below process can protect against a Remote Code Execution attack by disabling the LoginGraceTime parameter on Red Hat Enterprise Linux 9. However, the sshd server is still vulnerable to a Denial of Service if an attacker exhausts all the connections.\n\n1) As root user, open the /etc/ssh/sshd_config\n2) Add or edit the parameter configuration:\n~~~\nLoginGraceTime 0\n~~~\n3) Save and close the file\n4) Restart the sshd daemon:\n~~~\nsystemctl restart sshd.service\n~~~\n\nSetting LoginGraceTime to 0 disables the SSHD server's ability to drop connections if authentication is not completed within the specified timeout. If this mitigation is implemented, it is highly recommended to use a tool like 'fail2ban' alongside a firewall to monitor log files and manage connections appropriately.\n\nIf any of the mitigations mentioned above is used, please note that the removal of LoginGraceTime parameter from sshd_config is not automatic when the updated package is installed."}],"timeline":[{"lang":"en","time":"2024-06-27T00:00:00.000Z","value":"Reported to Red Hat."},{"lang":"en","time":"2024-07-01T08:00:00.000Z","value":"Made public."}],"credits":[{"lang":"en","value":"Red Hat would like to thank Qualys Threat Research Unit (TRU) (Qualys) for reporting this issue."}],"providerMetadata":{"orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat","dateUpdated":"2025-12-11T06:17:03.387Z"},"x_generator":{"engine":"cvelib 1.8.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-07-02T13:18:34.695298Z","id":"CVE-2024-6387","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-07-02T13:18:46.662Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-04-24T18:35:27.934Z"},"references":[{"url":"https://www.vicarius.io/vsociety/posts/regresshion-an-openssh-regression-error-cve-2024-6387"},{"url":"https://www.exploit-db.com/exploits/52269"},{"url":"https://packetstorm.news/files/id/190587/"},{"tags":["x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2024/07/01/12"},{"tags":["x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2024/07/01/13"},{"tags":["x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2024/07/02/1"},{"tags":["x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2024/07/03/1"},{"tags":["x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2024/07/03/11"},{"tags":["x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2024/07/03/2"},{"tags":["x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2024/07/03/3"},{"tags":["x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2024/07/03/4"},{"tags":["x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2024/07/03/5"},{"tags":["x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2024/07/04/1"},{"tags":["x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2024/07/04/2"},{"tags":["x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2024/07/08/2"},{"tags":["x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2024/07/08/3"},{"tags":["x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2024/07/09/2"},{"tags":["x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2024/07/09/5"},{"tags":["x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2024/07/10/1"},{"tags":["x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2024/07/10/2"},{"tags":["x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2024/07/10/3"},{"tags":["x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2024/07/10/4"},{"tags":["x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2024/07/10/6"},{"tags":["x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2024/07/11/1"},{"tags":["x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2024/07/11/3"},{"tags":["x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2024/07/23/4"},{"tags":["x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2024/07/23/6"},{"tags":["x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2024/07/28/2"},{"tags":["x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2024/07/28/3"},{"name":"RHSA-2024:4312","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"https://access.redhat.com/errata/RHSA-2024:4312"},{"name":"RHSA-2024:4340","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"https://access.redhat.com/errata/RHSA-2024:4340"},{"name":"RHSA-2024:4389","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"https://access.redhat.com/errata/RHSA-2024:4389"},{"name":"RHSA-2024:4469","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"https://access.redhat.com/errata/RHSA-2024:4469"},{"name":"RHSA-2024:4474","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"https://access.redhat.com/errata/RHSA-2024:4474"},{"name":"RHSA-2024:4479","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"https://access.redhat.com/errata/RHSA-2024:4479"},{"name":"RHSA-2024:4484","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"https://access.redhat.com/errata/RHSA-2024:4484"},{"tags":["vdb-entry","x_refsource_REDHAT","x_transferred"],"url":"https://access.redhat.com/security/cve/CVE-2024-6387"},{"tags":["x_transferred"],"url":"https://archlinux.org/news/the-sshd-service-needs-to-be-restarted-after-upgrading-to-openssh-98p1/"},{"tags":["x_transferred"],"url":"https://arstechnica.com/security/2024/07/regresshion-vulnerability-in-openssh-gives-attackers-root-on-linux/"},{"tags":["x_transferred"],"url":"https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server"},{"name":"RHBZ#2294604","tags":["issue-tracking","x_refsource_REDHAT","x_transferred"],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2294604"},{"tags":["x_transferred"],"url":"https://explore.alas.aws.amazon.com/CVE-2024-6387.html"},{"tags":["x_transferred"],"url":"https://forum.vmssoftware.com/viewtopic.php?f=8&t=9132"},{"tags":["x_transferred"],"url":"https://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2024-002.txt.asc"},{"tags":["x_transferred"],"url":"https://github.com/AlmaLinux/updates/issues/629"},{"tags":["x_transferred"],"url":"https://github.com/Azure/AKS/issues/4379"},{"tags":["x_transferred"],"url":"https://github.com/PowerShell/Win32-OpenSSH/discussions/2248"},{"tags":["x_transferred"],"url":"https://github.com/PowerShell/Win32-OpenSSH/issues/2249"},{"tags":["x_transferred"],"url":"https://github.com/microsoft/azurelinux/issues/9555"},{"tags":["x_transferred"],"url":"https://github.com/openela-main/openssh/commit/e1f438970e5a337a17070a637c1b9e19697cad09"},{"tags":["x_transferred"],"url":"https://github.com/oracle/oracle-linux/issues/149"},{"tags":["x_transferred"],"url":"https://github.com/rapier1/hpn-ssh/issues/87"},{"tags":["x_transferred"],"url":"https://github.com/zgzhang/cve-2024-6387-poc"},{"tags":["x_transferred"],"url":"https://lists.almalinux.org/archives/list/announce@lists.almalinux.org/thread/23BF5BMGFVEVUI2WNVAGMLKT557EU7VY/"},{"tags":["x_transferred"],"url":"https://lists.mindrot.org/pipermail/openssh-unix-announce/2024-July/000158.html"},{"tags":["x_transferred"],"url":"https://lists.mindrot.org/pipermail/openssh-unix-dev/2024-July/041431.html"},{"tags":["x_transferred"],"url":"https://news.ycombinator.com/item?id=40843778"},{"tags":["x_transferred"],"url":"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0010"},{"tags":["x_transferred"],"url":"https://santandersecurityresearch.github.io/blog/sshing_the_masses.html"},{"tags":["x_transferred"],"url":"https://security-tracker.debian.org/tracker/CVE-2024-6387"},{"tags":["x_transferred"],"url":"https://security.netapp.com/advisory/ntap-20240701-0001/"},{"tags":["x_transferred"],"url":"https://sig-security.rocky.page/issues/CVE-2024-6387/"},{"tags":["x_transferred"],"url":"https://stackdiary.com/openssh-race-condition-in-sshd-allows-remote-code-execution/"},{"tags":["x_transferred"],"url":"https://ubuntu.com/security/CVE-2024-6387"},{"tags":["x_transferred"],"url":"https://ubuntu.com/security/notices/USN-6859-1"},{"tags":["x_transferred"],"url":"https://www.akamai.com/blog/security-research/2024-openssh-vulnerability-regression-what-to-know-and-do"},{"tags":["x_transferred"],"url":"https://www.arista.com/en/support/advisories-notices/security-advisory/19904-security-advisory-0100"},{"tags":["x_transferred"],"url":"https://www.freebsd.org/security/advisories/FreeBSD-SA-24:04.openssh.asc"},{"tags":["x_transferred"],"url":"https://www.openssh.com/txt/release-9.8"},{"tags":["x_transferred"],"url":"https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt"},{"tags":["x_transferred"],"url":"https://www.splunk.com/en_us/blog/security/cve-2024-6387-regresshion-vulnerability.html"},{"tags":["x_transferred"],"url":"https://www.suse.com/security/cve/CVE-2024-6387.html"},{"tags":["x_transferred"],"url":"https://www.theregister.com/2024/07/01/regresshion_openssh/"},{"tags":["x_transferred"],"url":"https://support.apple.com/kb/HT214119"},{"tags":["x_transferred"],"url":"https://support.apple.com/kb/HT214118"},{"tags":["x_transferred"],"url":"https://support.apple.com/kb/HT214120"},{"tags":["x_transferred"],"url":"http://seclists.org/fulldisclosure/2024/Jul/20"},{"tags":["x_transferred"],"url":"http://seclists.org/fulldisclosure/2024/Jul/18"},{"tags":["x_transferred"],"url":"http://seclists.org/fulldisclosure/2024/Jul/19"}],"title":"CVE Program Container","x_generator":{"engine":"ADPogram 0.0.1"}}]},"dataVersion":"5.2"}